Hi [[ session.user.profile.firstName ]]
Sort by:
    • [Webcam Panel] What to Expect at Black Hat 2018
      [Webcam Panel] What to Expect at Black Hat 2018 Sean Martin (ITSPmagazine) | Eddie Lamb (6point6) | Other Panelists TBA Upcoming: Jul 31 2018 5:00 pm UTC 60 mins
    • Join this panel of industry experts as they share their experiences and thoughts on one of biggest security conferences in the world, Black Hat in Las Vegas, along with their expectations from this year's event.

      Tune in for an interactive Q&A panel with some of the biggest names in infosecurity to learn more about:
      - What can security professionals learn during Black Hat / DEF CON week
      - Must-attend events and why
      - What's new on the cyber threatscape
      - Advances in technology
      - AI: Hype vs Reality
      - Common sense advice for CISOs
      - How to keep your employees cyber safe

      Speakers:
      - Sean Martin, Co-Founder and Editor-in-Chief, ITSPmagazine
      - Eddie Lamb, Managing Director, Cyber Security at 6point6
      - Other Panelists TBA

      The session is being brought to you in partnership with ITSPmagazine.

      Read more >
    • [Webcam Panel] Technik unter der Lupe: Hardwarelösungen für den Endgeräteschutz
      [Webcam Panel] Technik unter der Lupe: Hardwarelösungen für den Endgeräteschutz Robin Fauerbach - HP Deutschland, Stefan Schrey - HP Austria Recorded: Jun 14 2018 12:00 pm UTC 53 mins
    • Die klassischen Netzgrenzen haben sich in Zeiten von BYOD und steigender Mobilität weitgehend aufgelöst. Heute reicht es nicht mehr aus, das Unternehmensnetz nur an den Grenzen nach außen mit Firewalls oder anderen Security-Lösungen zu schützen. Vielmehr ist es heute wichtiger denn je, direkt auf den Endgeräten für ein hohes Schutzniveau zu sorgen.

      Nachdem wir das Thema Client- bzw. Endgeräte-Security am 4. Juni bereits aus strategischer Sicht beleuchtet haben, geht es in diesem Webcast um eine stärker technisch geprägte Herangehensweise. Im Mittelpunkt steht wieder der Schutz der Endgeräte im Unternehmen: Mit welchen hardwareseitigen Maßnahmen lassen sich PCs oder Laptops sicherer machen, Manipulationen verhindern und Angriffe abwehren?

      Die Studioexperten von HP erläutern im Live-Webcast am 14. Juni, welche Techniken das Unternehmen zu diesem Zweck entwickelt hat. Sie gehen dabei auf die folgenden Punkte ein:

      - HP Endpoint Security Controller und Security-Mechanismen auf BIOS-Ebene, unabhängig vom Betriebssystem;
      - Hardened Security: Was versteht man darunter und wie ist diese in HP Clients implementiert, auch im Hinblick auf Authentifizierungsverfahren?
      - Betriebssystemprozesse können durch Malware gestoppt werden. Wie kann eine Hardwarelösung dies verhindern?
      - Systemwiederherstellung auf Knopfdruck durch einen im BIOS implementierten Mechanismus;
      - Die Security- und BIOS-Einstellungen sind implementiert und abgenommen. Wie lassen sich Security-Vorgaben in die Fläche ausrollen und kontrollieren?

      Herr Fauerbach und Herr Schrey werden während der Live-Sendung die Fragen der Zuschauer beantworten.

      Read more >
    • [Expert Panel] Are Containers & Microservices Ready for the Enterprise?
      [Expert Panel] Are Containers & Microservices Ready for the Enterprise? Robert Starmer, Tarak Modi, Mandy Hubbard Recorded: Apr 18 2018 5:00 pm UTC 64 mins
    • Join this live webcam panel moderated by Robert Starmer, Cloud Advisor and Founding Partner at Kumulus Technologies, to discuss the state of containers and microservices in the enterprise, and answer the following questions:

      Are containers and container managers like Kubernetes ready to deal with state, and state based services to support Enterprise workloads?
      Is the security model of the Docker container revolution enough for Enterprise applications?
      What is needed from a management domain to support Enterprise operations of a Container enabled Enterprise?
      Is the Hybrid model for container management mature enough to support Enterprises approach to the container cloud model?
      What is still missing in the container ecosystem in order to support Enterprise cloud transition?

      Robert will be joined by the following expert panelists:

      - Tarak Modi, President & CTO, TekNirvana
      - Mandy Hubbard, Software Engineer/QA Architect, CSDisco

      Read more >
    • Panel Discussion: Predictions for BI and Big Data Analytics in 2018
      Panel Discussion: Predictions for BI and Big Data Analytics in 2018 Matt Baird, AtScale; David Tishgart,Cloudera; Dan Kogan,Tableau Recorded: Oct 24 2017 4:00 pm UTC 58 mins
    • Big data creation, collection and applications have influenced business decisions more than ever in 2017, and if advances in artificial intelligence, virtual reality, and enterprise applications continue to prove valuable ventures, 2018 will be even bigger.

      With this in mind, how businesses approach and advance their big data maturity and cloud strategy can make or break the year. Whether it's running Hadoop workloads on-premise, public cloud, or hybrid deployments; maintaining continuity among the data, the applications, and the users must be top of mind.

      This webcam panel discussion will cover:

      - The considerations for a hybrid-cloud strategy
      - How should organizations approach a multi-cloud strategy
      - What are the best use cases for cloud deployments?
      - Futures for Big Data in the cloud

      Panel speakers:

      Matt Baird, CTO and Co-Founder, AtScale
      Bruno Aziza, CMO, AtScale
      David Tishgart, Director of Product Marketing, Cloudera
      Dan Kogan, Director of Product Marketing, Tableau

      Assess your 2018 Big Data Strategy at
      www.atscale.com/survey

      Read more >
    • Vendor Risk Management Performance: Key Reporting Metrics for Executives
      Vendor Risk Management Performance: Key Reporting Metrics for Executives Rebecca Ruiz (Southern California Edison), Tom Stumpek (Former CIO & CISO, General Electric), Joel Alcon (BitSight) Recorded: Nov 15 2017 4:00 pm UTC 55 mins
    • Organizations continue to outsource critical operations to third parties. As a result of this trend, security ratings are quickly becoming a key component of effective vendor risk management (VRM) strategies.

      Although Boards of Directors and senior executives are interested in their organization’s security posture, information security and risk management teams often lack the necessary information to help them understand details and clearly communicate about the aggregate risk of their vendor ecosystem.

      Join us as Rebecca Ruiz (Principal Advisor, IT Cybersecurity & Compliance, Southern California Edison), Tom Stumpek (former CISO and CIO, General Electric), and Joel Alcon (Product Marketing Manager, BitSight) discuss best practices for reporting metrics to senior executives around vendor risk management performance.

      Join this interactive webcam panel webinar to learn more about:
      - Southern California Edison’s methods of effectively reporting their vendor risk management program performance to their cybersecurity oversight group.
      - An executive perspective on the “do’s and don’ts” of successfully presenting your organization’s security posture through metrics and beyond.
      - Proactive ways to mitigate third party risk.

      Read more >
    • The Evolution of Executive Reporting
      The Evolution of Executive Reporting Rebecca Ruiz (Southern California Edison), Tom Stumpek (Former CIO & CISO, General Electric), Joel Alcon (BitSight) Recorded: Aug 30 2017 3:30 pm UTC 55 mins
    • Organizations continue to outsource critical operations to third parties. As a result of this trend, security ratings are quickly becoming a key component of effective vendor risk management (VRM) strategies.

      Although Boards of Directors and senior executives are interested in their organization’s security posture, information security and risk management teams often lack the necessary information to help them understand details and clearly communicate about the aggregate risk of their vendor ecosystem.

      Join us as Rebecca Ruiz (Principal Advisor, IT Cybersecurity & Compliance, Southern California Edison), Tom Stumpek (former CISO and CIO, General Electric), and Joel Alcon (Product Marketing Manager, BitSight) discuss best practices for reporting metrics to senior executives around vendor risk management performance.

      Join this interactive webcam panel webinar to learn more about:
      - Southern California Edison’s methods of effectively reporting their vendor risk management program performance to their cybersecurity oversight group.
      - An executive perspective on the “do’s and don’ts” of successfully presenting your organization’s security posture through metrics and beyond.
      - Proactive ways to mitigate third party risk.

      Read more >
    • LIVE Interactive Q&A: Steve Durbin on the Yahoo Data Breach
      LIVE Interactive Q&A: Steve Durbin on the Yahoo Data Breach Steve Durbin, Managing Director, ISF Ltd Recorded: Sep 30 2016 10:00 am UTC 49 mins
    • Last week Yahoo was hit with the biggest data breach of all time; with an estimated 500 million customer accounts compromised by hackers. The attack will have significant rippling effects on consumer trust, data protection standards and information security practices. The legal battle is now also only just beginning, with two key cases being heard in California, as Yahoo is sued for data-protection negligence.

      But what will does all this mean to your business? Do you feel compromised professionally or personally? Were key mistakes made that you can avoid? How can you best prepare (in terms of incident response) to such a breach? Will the attack have lasting effects or will it disappear into the annuls of history alongside the Ashley Maddison, Target and Linkedin hacks. All these questions and more will be answered live, over webcam by Security expert and Managing Director of the ISF Steve Durbin.

      Tune in, ask your burning questions and join the conversation on BrightTALK.

      Read more >